Get my own profile
Public access
View all12 articles
16 articles
available
not available
Based on funding mandates
Co-authors
- Charles KamhouaDEVCOM Army Research Laboratory, Adversarial Resilient Cyber Methodology Team LeaderVerified email at army.mil
- Zelin WanDepartment of Computer Science, Virginia TechVerified email at vt.edu
- Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
- Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
- Christopher KiekintveldUniversity of Texas at El PasoVerified email at utep.edu
- George AtiaProfessor, University of Central FloridaVerified email at ucf.edu
- Nandi LesliePrincipal Technical Fellow, RTXVerified email at rtx.com
- Tamer ElBattProfessor, Wireless Networks and Mobile Computing, The American University in CairoVerified email at ieee.org
- Anjon (Sunny) BasakStormfish Scientific CorporationVerified email at stormfish.io
- Ahmed H. ZahranLecturer, University College Cork, IrelandVerified email at cs.ucc.ie
- Karim G. SeddikProfessor, Associate Dean for Graduate Studies and Research, American University in CairoVerified email at aucegypt.edu
- Amr MohamedProfessor, Qatar University, senior member IEEEVerified email at qu.edu.qa
- M Majid ButtNokiaVerified email at nokia.com
- Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Verified email at mbzuai.ac.ae
- Ahmed ElshafieWireless Sys. Eng. at Apple, Editor IEEE TCOM, Senior Editor IEEE COMM LETTERS, Senior IEEE MemberVerified email at apple.com
Follow
Ahmed H. Anwar, (Ahmed Hemida)
Other namesAhmed Hemida, Ahmed H. Anwar Hemida
Research Scientist, DEVCOM ARL
Verified email at knights.ucf.edu